applied cryptography - protocols, algorithms, and source code in c

3 look up in the table for each possible k2 elements

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 7 34 Algorithm MDC (using MD4) MDC (using MD5) MDC (using SHA) NewDES REDOC II REDOC III RC5-32/8 RC5-32/12 RC5-32/16 RC5-32/20 SAFER (6 rounds) SAFER (8 rounds) SAFER (10 rounds) SAFER (12 rounds) Encryption Speed (Kilobytes/second) 186 135 23 233 1 78 127 86 65 52 81 61 49 41 Luby-Rackoff (using SHA) Lucifer 11 52 3-Way Triple-DES 25 12 Previous Table of Contents Next Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) Go! Keyword Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book: Go! Previous Table of Contents Next ----------- Chapter 15 Combining Block Ciphers There are many ways to combine block algorithms to get new algorithms. The impetus behind these schemes is to try to increase security without going through the trouble of designing a new algorithm. DES is a secure algorithm; it has been cryptanalyzed for a good 20 years and the most practical way to break it is still brute force. However, the key is too short. Wouldn’t it be nice to use DES as a building block for another algorithm with a longer key? We’d have the best of both worlds: the assurance of two decades of cryptanalysis plus a long key. Multiple encryption is one combination technique: using an algorithm to encrypt the same plaintext block multiple times with multiple keys. Cascading is like multiple encryption, but uses different algorithms. There are other techniques. Encrypting a plaintext block twice with the same key, whether with the same algorithm or a differen...
View Full Document

Ask a homework question - tutors are online